Instructions

ZOOM IN by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.

MOVE the page around when zoomed in by dragging it.

ADJUST the zoom using the slider on the top right.

ZOOM OUT by clicking on the zoomed-in page.

SEARCH by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues
respectively.
.

PRINT by clicking on thumbnails to select pages, and then press the
print button.

SHARE this publication and page.

ROTATE PAGE allows you to turn pages 90 degrees clockwise or counterclockwise.Click on the page to return to the original orientation. To zoom in on a rotated page, return the page to its original orientation, zoom in, and
then rotate it again.

CONTENTS displays a table of sections with thumbnails and descriptions.

ALL PAGES displays thumbnails of every page in the issue. Click on
a page to jump.

12 MARCH/APRIL 2015 | DefenseSystems.com
rity reviews to the National Information Assurance Partner-
ship, was to ensure that commercial mobile technologies are
secure when they’re attached to military networks.
Given the spate of data breaches at major corporations last
year, it’s no surprise that phone and tablet makers are beef-
ing up their security features. Fingerprint identification got
a boost when Apple incorporated the technology in 2013.
Other suppliers followed suit, simplifying log-ons while
making it more difficult for unauthorized users to use a lost
or stolen phone. According to IHS Technology Research,
shipments of fingerprint-enabled handsets and tablets will
reach 1.4 billion in 2020.
Commercial fingerprint readers aren’t ruggedized for mili-
tary environments, but fingerprint detection techniques that
mesh more closely with military requirements are emerging.
In early March, Qualcomm unveiled an ultrasonic finger-
print reader that can read fingerprints even they’re dirty or
wet. That could be a beneficial advance for military users,
who often work in less than ideal conditions. The sound
waves can also pass through glass, aluminum, stainless steel
and plastics, making it easier to integrate the fingerprint sen-
sor into ruggedized military hardware.
Tablet and smartphone suppliers are adding more secu-
rity layers, enhancing protection by providing defense-in-
depth. BlackBerry and Samsung are now working together
to provided multiple levels of hardware- and software-based
protection. Samsung’s technology permits multiple identi-
ties using what’s called a virtual SIM. That could be used
to isolate secret and non-critical communications. The two
companies will combine these concepts with BlackBerry’s
highly secure network infrastructure and its cross-platform
enterprise mobility management solution.
APPS APLENTY
The adoption of tablets and smartphones comes in con-
junction with the military’s expanding interest in apps for
these devices. App libraries are popping up and expanding
throughout the armed services. Military equipment suppli-
ers also are beefing up their capabilities.
For example, an app from iRobot is making it easier to
control unmanned vehicles. The company’s uPoint MRC
system runs an Android app that provides a common look
and feel for all iRobot vehicles. Warfighters can use tablets
to manage robot operations, including driving, manipula-
tion and inspection, allowing operators to focus more on the
mission at hand instead of control techniques.
“Success as a robot operator during high-stress, critical
operations depends on precise and reliable control, so the
interface needs to be intuitive,” said Frank Wilson, senior
vice president and general manager of iRobot’s Defense &
Security business unit. “The uPoint MRC system drives mis-
sion effectiveness by decreasing training time and increasing
overall ease of use.”
The Army’s medics may soon deploy a smartphone app
0415ds_010-013.indd 12
3/13/15 12:43 PM